Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

API Gateway Security: The Essential InfoSec Guide

As the software world shifted toward microservices and distributed architectures, the volume and complexity of API traffic have skyrocketed. Unfortunately, so has the number of API-related breaches and cyber attacks. Last year, nearly 44% of all advanced bot traffic online targeted API endpoints, while traditional web applications received just 10% of the malicious traffic. It’s no surprise that 57% of organizations admit to having suffered API-related breaches in the past two years.

Your Code Might Be Using Risky AI Models

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

New Unifying API and Product Security with Jit + Traceable: Accelerated Triage, Smarter Remediation

As the Director of Product Marketing for Jit, Charlie is responsible for telling Jit's story to the developer and security communities. We’re excited to announce that Traceable is now integrated with Jit. Today’s security teams are overwhelmed — drowning in vulnerability alerts and disconnected tooling. Traceable delivers deep, contextual API and application security insights, automatically identifying vulnerabilities with rich runtime context and risk-based prioritization.

Turn Visitors into Buyers: How to Reduce Customer Drop-Off & Increase Conversion | Shopify Webinar

Over 70% of customers abandon their carts before checkout, and most stores never figure out why. In this exclusive webinar, we break down why Shopify visitors abandon their carts, where the drop-offs occur, and how to win them back with smart re-engagement strategies and powerful analytics tools. From identifying drop-off points to fixing friction and boosting conversions, we’ve covered it all! What You’ll Learn.

Catch Bugs Faster: Cursor's BugBot for AI Code Review

In this video we dive into Cursor's 1.0 release, focusing on their new BugBot feature. This AI-powered tool integrates with your GitHub workflow to automatically review pull requests and identify potential bugs. We'll show you how to set up BugBot, trigger it on a pull request, and analyze the issues it finds, including a real-world example of it catching errors in AI-generated code from Google's Jules tool.

The New Threat Landscape: AI-Native Apps and Agentic Workflows

Businesses are moving beyond AI experiments and proofs of concept. As we approach what IDC is predicting will be the “AI pivot years” of 2025-2026, organizations are prioritizing, planning, and building for scale. This shift includes AI agents — self-directed tools that automate tasks — as technology providers strive to simplify development workflows. Under the surface, AI systems expose an expanded threat landscape that spans the software development lifecycle (SDLC).

Stablecoins in Banking: Strategic Insights from the 2025 Survey

The strategic conversation around stablecoins has moved beyond innovation labs and pilot programs. It’s now a focus in executive leadership meetings and shareholder reports. In June, Bank of America’s CEO highlighted stablecoins as a potential new form of transaction account, one the industry must be ready for. SMBC has signed a multi-party MOU to explore wholesale stablecoin infrastructure.

How Human Behavior Can Strengthen Healthcare Cybersecurity

Few sectors exemplify the enormous value of data as healthcare does. From the relatively mundane, such as digitalizing patient data for streamlined care, to the extraordinary, like the use of AI to revolutionize prostate cancer diagnosis and care, data is the lifeblood of modern healthcare and, as such, must be protected. For years, we have been told that humans and human error are the weakest link in cyber defenses, but it's time to challenge this notion.

Are WAFs Obsolete? Pros, Cons, and What the Future Holds

Web Application Firewalls (WAFs) have long served as the front line of defense for web applications, filtering out malicious traffic and enforcing security policies. But as threats grow more sophisticated and application environments become more dynamic, many are questioning whether traditional WAFs are still up to the task. In 2025, with the rise of cloud-native applications, APIs, and machine learning-driven attacks, it's no longer enough to rely on static, rule-based filtering.